S. Abiteboul, R. Hull, and V. Vianu, Foundations of Databases, 1995.

E. Bertino and R. Sandhu, Database security - concepts, approaches, and challenges, IEEE Transactions on Dependable and Secure Computing, vol.2, issue.1, pp.2-18, 2005.
DOI : 10.1109/TDSC.2005.9

J. Biskup, Boyce???Codd normal form and object normal forms, Information Processing Letters, vol.32, issue.1, pp.29-33, 1989.
DOI : 10.1016/0020-0190(89)90065-3

J. Biskup and P. Bonatti, Controlled query evaluation for enforcing confidentiality in complete information systems, International Journal of Information Security, vol.8, issue.1, pp.14-27, 2004.
DOI : 10.1007/s10207-004-0032-1

J. Biskup and P. Bonatti, Controlled query evaluation with open queries for a decidable relational submodel, Annals of Mathematics and Artificial Intelligence, vol.19, issue.4, pp.39-77, 2007.
DOI : 10.1007/s10472-007-9070-5

J. Biskup and P. A. Bonatti, Lying versus refusal for known potential secrets, Data & Knowledge Engineering, vol.38, issue.2, pp.199-222, 2001.
DOI : 10.1016/S0169-023X(01)00024-6

J. Biskup and P. A. Bonatti, Controlled Query Evaluation for Known Policies by Combining Lying and Refusal, Ann. Math. Artif. Intell, vol.40, pp.37-62, 2004.
DOI : 10.1007/3-540-45758-5_4

J. Biskup, D. W. Embley, and J. Lochner, Reducing inference control to access control for normalized database schemas, Information Processing Letters, vol.106, issue.1, pp.8-12, 2008.
DOI : 10.1016/j.ipl.2007.09.007

J. Biskup and J. Lochner, Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control, Proc. Information Security (ISC), pp.407-422, 2007.
DOI : 10.1007/978-3-540-75496-1_27

J. Biskup, J. Lochner, and S. Sonntag, Optimization of the Controlled Evaluation of Closed Relational Queries, Proc. IFIP SEC, pp.214-225, 2009.
DOI : 10.1145/319830.319833

P. Bonatti, S. Kraus, and V. S. Subrahmanian, Foundations of secure deductive databases, IEEE Transactions on Knowledge and Data Engineering, vol.7, issue.3, pp.406-422, 1995.
DOI : 10.1109/69.390247

A. Brodsky, C. Farkas, and S. Jajodia, Secure databases: constraints, inference channels, and monitoring disclosures, IEEE Transactions on Knowledge and Data Engineering, vol.12, issue.6, pp.900-919, 2000.
DOI : 10.1109/69.895801

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.130.2195

J. Byun and E. Bertino, Micro-views, or on how to protect privacy while enhancing data usability, ACM SIGMOD Record, vol.35, issue.1, pp.9-13, 2006.
DOI : 10.1145/1121995.1121997

F. Cuppens and A. Gabillon, Cover story management, Data & Knowledge Engineering, vol.37, issue.2, pp.177-201, 2001.
DOI : 10.1016/S0169-023X(01)00006-4

URL : https://hal.archives-ouvertes.fr/hal-00994108

S. Dawson, S. De-capitani-di-vimercati, and P. Samarati, Specification and enforcement of classification and inference constraints, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344), pp.181-195, 1999.
DOI : 10.1109/SECPRI.1999.766913

H. S. Delugach and T. H. Hinke, Wizard: a database inference analysis and detection system, IEEE Transactions on Knowledge and Data Engineering, vol.8, issue.1, pp.56-66, 1996.
DOI : 10.1109/69.485629

C. Farkas and S. Jajodia, The inference problem, ACM SIGKDD Explorations Newsletter, vol.4, issue.2, pp.6-11, 2002.
DOI : 10.1145/772862.772864

A. Galinovic and V. Antoncic, Polyinstantiation in Relational Databases with Multilevel Security, 2007 29th International Conference on Information Technology Interfaces, pp.127-132, 2007.
DOI : 10.1109/ITI.2007.4283757

P. P. Griffiths and B. W. Wade, An authorization mechanism for a relational database system, ACM Transactions on Database Systems, vol.1, issue.3, pp.242-255, 1976.
DOI : 10.1145/320473.320482

J. Hale and S. Shenoi, Analyzing FD inference in relational databases, Data & Knowledge Engineering, vol.18, issue.2, pp.167-183, 1996.
DOI : 10.1016/0169-023X(95)00033-O

S. Jajodia and R. S. Sandhu, Toward a multilevel secure relational data model, SIGMOD Conference, pp.50-59, 1991.

T. F. Lunt, D. E. Denning, R. R. Schell, M. Heckman, and W. R. Shockley, The SeaView security model, IEEE Transactions on Software Engineering, vol.16, issue.6, pp.593-607, 1990.
DOI : 10.1109/32.55088

W. Rjaibi and P. Bird, A Multi-Purpose Implementation of Mandatory Access Control in Relational Database Management Systems
DOI : 10.1016/B978-012088469-8.50088-7

R. Sandhu, Lattice-based access control models, Computer, vol.26, issue.11, pp.9-19, 1993.
DOI : 10.1109/2.241422

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.29.5742

G. L. Sicherman, W. De-jonge, and R. P. Van-de-riet, Answering queries without revealing secrets, ACM Transactions on Database Systems, vol.8, issue.1, pp.41-59, 1983.
DOI : 10.1145/319830.319833

M. Stonebraker and E. Wong, Access control in a relational data base management system by query modification, Proceedings of the 1974 annual conference on , ACM 74, pp.180-186, 1974.
DOI : 10.1145/800182.810400

T. Su and G. Özsoyoglu, Controlling FD and MVD inferences in multilevel relational database systems, IEEE Transactions on Knowledge and Data Engineering, vol.3, issue.4, pp.474-485, 1991.
DOI : 10.1109/69.109108